Shifting Left Isn’t Enough: Own the East-West Corridor to Secure Your Cloud

Logo
Presented by

Mike Sanders, Sr. Cloud SecEng, ExtraHop; Meg West, Incident Responder; Kristy Westphal, VP SecOps; Brandon Dunlap, Moderator

About this talk

Enterprises are shifting left in the cloud by building security into workload and application code. It’s a smart first line of defense, but no code—no matter how secure—is bulletproof. That’s why enterprises are turning to east-west visibility and post-compromise threat detection as part of a defense-in-depth strategy. By identifying attack techniques like lateral movement and detecting advanced threats, you can reduce dwell time and mitigate the blast radius of ransomware, software supply chain attacks, and more. Join ExtraHop and (ISC)² on March 24, 2022, for a panel discussion on the benefits of taking a defense-in-depth approach to cloud security built on east-west visibility and post-compromise detection.
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (188)
Subscribers (136686)
ISC2 hosts regular panel discussions on hot button infosecurity topics featuring thought leaders and visionaries from the industry who answer questions from the audience.